How to Leverage Upstream Platform in a SOC

DAN SAHAR

VP of Products

[Transcript]

One of the key groups that use The Upstream platform within the customer environment, is a security team within the Vehicle Security Operations Center, or VSOC. What we have here in this diagram is a connected car platform powering multiple services at the same time. So what we have here are connected vehicles that ultimately connect to an automotive cloud via a mobile network. And within this automotive cloud, we have various hosted applications, such as telematics, such as mobile apps, such as LIDAR, and then they’re all powering various services that are offered by either this OEM or fleet. What we have here is a SOC, or a Security Operations Center, that’s powered by security analysts leveraging multiple tools, such as workflow solutions or SIEM solutions. So now let’s look at how the SOC team would leverage Upstream’s platform in order to create a single source of truth for their automotive cyber security.

The Upstream C4 platform is data-driven. So the first thing that we do is, we collect data from multiple sources, both from in-vehicle sources such as in-vehicle security, from the applications, and from the actual end services that are using this connected vehicle or platform. The C4 platform then uses our multiple cyber security engines to detect violations. The C4 platform then converts the violations into incidents and sends these incidents into the SIEM or workflow solutions that are being used within the SOC.

The SOC team would typically have a playbook of what they want to do in case of a certain incident type. For example, the SOC may want to dispatch the right personnel or security analysts to be able to perform triage and analyze the specific incident. An easy way to do that is to leverage the incident identifier that was received from the Upstream platform, and then the analyst can actually click on the link and go back to the Upstream platform and get a drill-down right away into the specific parameters of that incident. The analyst can then go right to work to the Upstream platform that’s already running within the SOC, and then they can perform triage using our contextually rich data within our dashboard. Upstream provides multiple tools for slicing and dicing the data in order to get to the root cause and actually understand what took place and whether this was a cyber security incident or something that may have been just a fault or a misconfiguration on the connected car service.

Many of our customers use a typical workflow as outlined here, and at the end of the day, Upstream’s C4 platform becomes the single source of truth for automotive cyber security in their connected car environment.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Don’t wait for warranty claims to pile up

Don’t wait for warranty claims to pile up. Using your connected vehicle data, repair order trends, and DTC analytics you can detect patterns before they…

More Details

Too many claims, not enough time

Too many claims, not enough time. Upstream helps you cut through the noise with AI-powered prioritization: ranking issues by impact, predicted cost, and severity so…

More Details

Speed matters when quality claims hit

Speed matters when quality claims hit. With Upstream’s proactive quality detection, you can accelerate root cause analysis by seeing every vehicle in full context: claims,…

More Details

Turn complex vehicle data into instant answers

Turn complex vehicle data into instant answers with Upstream’s Ocean AI. See how “talking to your data” makes analysis simple. Ask questions, spot issues, set…

More Details

프랑스어 요약 – 모빌리티와 IoT의 미래 보안 및 강화

업스트림은 커넥티드 카, IoT, 스마트 모빌리티 데이터의 잠재력을 극대화합니다. 업스트림의 데이터 관리 플랫폼은 진화하는 사이버 위험으로부터 모�

More Details

모빌리티 분야의 사이버 위협에 대한 정보

실행 가능한 수정 권장 사항에 뒷받침된 실행 가능한 장치별 분석을 통해 모빌리티 위협 환경에 대한 탁월한 가시성을 확보하세요.

More Details
Skip to content